HTTP: DLINK NAS hardcoded credentials and code execution

This signature detects attempts to exploit a known vulnerability against D-link. A successful attack can lead to arbitrary code execution.

Extended Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

References

CVE: CVE-2024-3272

Short Name
HTTP:MISC:DLINK-NAS-CRED-CE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2024-3272 CVE-2024-3273 DLINK NAS and code credentials execution hardcoded
Release Date
12/09/2024
Supported Platforms

srx-branch-12.3

srx-branch-19.3

vsrx3bsd-19.2

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

srx-19.4

vsrx-12.3

srx-12.3

vsrx-19.2

srx-19.3

Sigpack Version
3763
False Positive
Unknown

Found a potential security threat?